A new year is the time for lots of pledges of how things will be done differently: new targets to meet, processes to drive forward and the chance to make positive changes. By Dan Panesar, VP EMEA, Certes Networks.
Read MoreOut of all the IT security risks we face, mobile devices are the hardest to defend from cyber attacks, according to a 2018 cybersecurity report. This is not surprising as they have unique vulnerabilities that nefarious parties can exploit. Some examples of malicious tactics include spoofing free...
Read MoreWhilst the concept of Zero Trust (ZT) networks is gaining broad popularity and acclaim, elements of the approach have been quietly adopted and applied within some sensitive government IT environments. By Bernard Parsons, CEO, Becrypt.
Read MoreThe technology industry is renowned for its relentless pace and rewards for first mover advantage. As such, it’s no surprise to see new IoT products constantly being designed, manufactured and released as quickly as possible. Unfortunately, this rush to market often means security is little more...
Read MoreCorporate Cybersecurity is a huge concern for both customers and business owners alike with the...
Read MoreLast year, Russia started a widespread cyber-attack targeting critical infrastructures around the...
Read More1989 was of a year of positive milestones which would have a profound impact on the way we live and...
Read MoreIf we can take anything from the continuous spate of data breaches, it’s that bad actors and...
Read MoreThe threat from internal and external cyber attackers increasingly involves stealing the passwords...
Read MoreIT security professionals continuously have to tackle high levels of security alerts in the global...
Read MoreAn unfortunate truth in business is that any worker, in any organisation, can be the target of a...
Read MoreJan van Vliet, VP and GM, EMEA, Digital Guardian discusses why switching to a more data-centric...
Read More